نتایج جستجو برای: have always brought about security challenge
تعداد نتایج: 3825509 فیلتر نتایج به سال:
a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...
for several years, researchers in familiarity of efl teachers with post-method and its role in second and foreign language learners’ productions have pointed out that the opportunity to plan for a task generally develops language learners’ development (ellis, 2005). it is important to mention that the critical varies in language teaching was shown is the disappearances of the concept of method ...
Online examinations are open to many security threats. These include intrusion by hackers, and collusion and plagiarism by students. This paper presents a focus group study to understand the views of online programme tutors on security threats to online examinations, authentication approaches and the proposed challenge question method. The findings showed that majority of participants were conc...
the present article discusses about the us security policy after the incident of 11 september 2001, with reference to the middle east, in general and iran in particular. the author focuses the design of current us administration and its endeavor to capture some of the strategic places in the name of terrorism and as a savior of democracy such as in afghanistan and iraq, although those designs h...
Background: Bangladesh is a developing country; so, it is faced with the great challenge of food insecurity. In spite of achieving self-sufficiency in food production, a huge number of people experience the food insecure situation in this country. Since long time ago, scientists are striving to feed the growing population of Bangladesh. However, this study was conducted to assess the present si...
More and more companies tend to use secure products as COTS to develop their secure systems due to resource limitations. The security concerns add more complexity as well as potential risks to COTS selection process, and it is always a great challenge for developers to make the selection decisions. In this paper, we provide a method for security risk analysis in COTS based development (CBD) bas...
Detection and recognition of the facial images of people is an intricate problem which has garnered much attention during recent years due to its ever increasing applications in numerous fields. It continues to pose a challenge in finding a robust solution to it. Its scope extends to catering the security, commercial and law enforcement applications. Research for moreover a decade on this subje...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید